Am 29. Jul, 2016 schwätzte Tom Roche so:

moin moin,

and how many fingerprints can be replicated from people waving during a
selfie?

Cop shows demonstrate all the time that fingerprints and DNA are pretty
easy to come by without even having to resort to the enhance button.

In both cases, rotating them on a regular basis is a dangerous and
expensive process.

ciao,

der.hans

Following the recent deprecation of 2FA over SMS (thread head here[1]), I was interested 
to note this NPR article[2] (dated 'July 27, 2016 2:34 PM ET'): "Police Use 
Fingertip Replicas To Unlock A Murder Victim's Phone". Basically, a team @ Michigan 
State University found a way to replicate a fingerprint good enough to unlock a phone. 3 
things I noted:

1. The two-part approach that worked (after 2 previous fails) doesn't seem that hard to 
replicate. The MSU team enhanced previously-taken, plain-old-fashioned fingerprints, then 
printed the enhancements with conductive ink. One suspects this will be off-the-shelf 
before too long. Combine that with the following observations (file under 
"ISTM/ICBW") that

* there's a lot more fingerprinting "going on out there." E.g., I'm pretty sure 
I was required to give fingerprints as part of my EPA clearance. (I.e., what one does in 
order to gain access to ... scientific compute clusters.)

* fingerprints aren't that hard to take, given an item handled at (e.g.) a 
workplace or restaurant.

2. What surprised me more is, under current law (sorta--caveat below) something like a password (an 
"expression") is not subject to "force compulsion," but ...

"The Smartphone versus the Fifth Amendment," Berkeley Technology Law Journal, 
21 Dec 2014[3]
in the aftermath of Virginia v. Baust, many smartphone users may soon 
reconsider their reliance on fingerprint ID technology.

In October [2014], a Virginia trial judge ruled [in Virginia v. Baust] that unlike a 
passcode, the production of one's fingerprint is not "testimonial 
communication", and therefore, the Fifth Amendment privilege against 
self-incrimination cannot be invoked. Rather, the government may properly compel the 
production of a smartphone user's fingerprint to unlock the user's device. This force 
compulsion would ostensibly extend to any applications within a device that can be opened 
via fingerprint.

However,

As a trial court, the ruling in Virginia v. Baust is not mandatory law. 
However, as with any early caselaw in a novel and undeveloped area of the law, 
this opinion will likely be cited as a persuasive authority.

IANAL, so I don't know of subsequent use, or even how to search the case law 
for it.

3. I'd be interested to know is, would a hardware key (e.g., SecurID, YubiKey) 
be considered compellable or not? Either way, for 2FA purposes currently,

4. ... I'd hafta agree with Ed[4] that password+key beats password+SMS.

5. ... ISTM password+key beats password+fingerprint to the extent that (IIUC) a 
duplicate key will be harder to hack than a fingerprint for the forseeable 
future. Am I missing something?

FWIW, Tom Roche <[email protected]>

[1]: http://lists.phxlinux.org/lurker/message/20160727.071321.f24aaba8.en.html
[2]: 
http://www.npr.org/sections/alltechconsidered/2016/07/27/487605182/police-use-fingertip-replicas-to-unlock-a-murder-victims-phone
[3]: http://btlj.org/2014/12/the-smartphone-versus-the-fifth-amendment/
[4]: http://lists.phxlinux.org/lurker/message/20160729.055043.2f7884f4.en.html
---------------------------------------------------
PLUG-discuss mailing list - [email protected]
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss


--
#  http://www.LuftHans.com/        http://www.PhxLinux.org/
#  Very frankly, I am opposed to people being programmed by others.
#    -- Fred Rogers, aka Mr. Rogers (1928-2003)
---------------------------------------------------
PLUG-discuss mailing list - [email protected]
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss

Reply via email to